Blog categorized as Uncategorized


 

The operating system has been out of support for a full decade. The only notable public patches since then were in 2017 and 2019 for the eternalblue exploit (wannacry) and bluekeep.

 

Despite this, in 2024 an estimated 0.5% of enterprise systems still run Windows XP. There are many cas...

30.07.24 01:59 AM - Comment(s)

One of the ways we can refine security and influence energy is by looking at bug bounty programs. These are where the hardware and software vendor offer cash payouts to hackers who can demonstrate vulnerabilities in their software.

 

This creates an economic value floor on the size of organiza...

26.07.24 11:26 AM - Comment(s)

This is the golden question that determines if you'll be staying late tonight securing the network or off early to hit the links.

 

You can reframe the question into "How much influence energy does the threat represent?" By determining this, you can know if you need to add new counte...

09.07.24 02:01 AM - Comment(s)

How does the Security Energy framework relate to the Pyramid of Pain?. This influential analysis of cyber threat intelligence organizes attack attributes according to how difficult they are to change.

 

If you think this sounds a lot like Influence Energy…you are right! How does each level of ...

01.07.24 04:00 AM - Comment(s)

Your concerns might include:

  • Are they needed for effective protection?
  • Are they worth the money?
  • Do they just gum everything up?
  • Are they tough to remove?
  • Do they open me up to online attacks?

 

These are all valid concerns and for most people, basic cyber hygiene is all you need.

&...

22.06.24 02:44 AM - Comment(s)